SM3 (hash function) explained
SM3 |
Designers: | National Cryptography Administration |
Publish Date: | 2010 |
ShangMi 3 (SM3) is a cryptographic hash function used in the Chinese National Standard. It was published by the National Cryptography Administration (Chinese: 国家密码管理局) on 2010-12-17[1] [2] as "GM/T 0004-2012: SM3 cryptographic hash algorithm".
SM3 is used for implementing digital signatures, message authentication codes, and pseudorandom number generators.[3] The algorithm is public[4] [5] and is considered similar to SHA-256 in security and efficiency.[6] SM3 is used with Transport Layer Security.[7]
Definitive standards
SM3 is defined in each of:
- GM/T 0004-2012: SM3 cryptographic hash algorithm
- GB/T 32905-2016: Information security techniques—SM3 cryptographic hash algorithm[8]
- ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions
- IETF RFC draft-sca-cfrg-sm3-02
See also
Notes and References
- Web site: Announcement No.23 of the State Cryptography Administration . The Office of Security Commercial Code Administration (OSCCA) . 2012-03-21 . 2016-07-24 . dead . https://web.archive.org/web/20160814151056/http://www.oscca.gov.cn/News/201204/News_1228.htm . 2016-08-14 . zh-cn.
- Web site: SM3 cryptographic hash algorithm . . 2013-12-04 . 2016-07-24 . zh-cn . 2016-09-19 . https://web.archive.org/web/20160919080203/http://www.cnnic.cn/gcjsyj/qyjsyj/mmsfbz/sm3/201312/t20131204_43340.htm . dead .
- Web site: The SM3 Cryptographic Hash Function . . 2018-01-08 . 2023-11-16.
- Web site: Announcement No.22 of the State Cryptography Administration . The Office of Security Commercial Code Administration (OSCCA) . 2010-12-17 . 2016-08-06 . zh-cn.
- Web site: SM3 cryptographic hash algorithm . zh-cn.
- Web site: An Efficient and Low-Power Design of the SM3 Hash Algorithm for IoT . Electronics . 2019-09-11 . 2021-02-11 . en-us.
- 8998 . Yang . P . March 2021 . . 2022-07-30 . 10.17487/RFC8998.
- [Wang Xiaoyun]